Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Securing VoIP Networks: Threats, Vulnerabilities, and Countermeasures
Securing VoIP Networks: Threats, Vulnerabilities, and Countermeasures

Communication between people has changed with the invention of the telephone. The ability to communicate across continents in real-time has also helped our society in several dimensions including entertainment, trade, finance, and defense. But this new capability did not come without an investment. Building an international telephony...

Personal Web Usage in the Workplace: A Guide to Effective Human Resources Management
Personal Web Usage in the Workplace: A Guide to Effective Human Resources Management

An important aspect of managing human capital in the 21st century workplace is managing the interface between humans and information technology, particularly the World Wide Web. The Web has changed not only how and where business is conducted, but also how and where work is done. Personal web usage has created many desirable organizational...

Software Testing and Quality Assurance: Theory and Practice
Software Testing and Quality Assurance: Theory and Practice
A superior primer on software testing and quality assurance, from integration to execution and automation

This important new work fills the pressing need for a user-friendly text that aims to provide software engineers, software quality professionals, software developers, and students with the fundamental developments in testing theory and...

Data Modeling for Metrology and Testing in Measurement Science
Data Modeling for Metrology and Testing in Measurement Science
This book and companion DVD provide a comprehensive set of modeling methods for data and uncertainty analysis, taking readers beyond mainstream methods described in standard texts. The emphasis throughout is on techniques having a broad range of real-world applications in measurement science. Mainstream methods of data modeling and analysis...
iPhone: The Missing Manual: Covers iPhone 4 & All Other Models with iOS 4 Software
iPhone: The Missing Manual: Covers iPhone 4 & All Other Models with iOS 4 Software

With multitasking and more than a 100 other new features, iPhone 4.0 is a real treat, cooked up with Apple's traditional secret sauce of simplicity, intelligence, and whimsy. iPhone: The Missing Manual gives you a guided tour of everything the new iPhone has to offer, with lots of tips, tricks, and surprises. Learn how to...

Hacking: The Beginners Guide to Master The Art of Hacking In No Time - Become a
Hacking: The Beginners Guide to Master The Art of Hacking In No Time - Become a

Do you want to learn ethical hacking/ penetration testing but not sure where to begin? Does the amount of information on the web make you feel overwhelmed and confused? Or maybe your looking to start a career as an ethical hacker and want to further your skills? How about step by step, methodical, literally foolproof approaches to be...

Signaling System No. 7 (SS7/C7): Protocol, Architecture, and Services
Signaling System No. 7 (SS7/C7): Protocol, Architecture, and Services

SS7/C7 is a signaling network and protocol that is used worldwide to bring telecommunications networks, both fixed-line and cellular, to life. Setting up phone calls, providing cellular roaming and messaging, and converged voice/data services, such as Internet Call Waiting, are only a few of the vast number of ways that...

Cisco® BGP-4 Command and Configuration Handbook (CCIE Professional Development)
Cisco® BGP-4 Command and Configuration Handbook (CCIE Professional Development)

As the means by which Internet destinations are communicated between subscribers and service providers, BGP-4 provides a critical function for Internet operations. Whether associated with Internet service providers or enterprise networks that depend heavily on the Internet, a background in BGP-4 is essential. Moving beyond...

The Tao of Network Security Monitoring : Beyond Intrusion Detection
The Tao of Network Security Monitoring : Beyond Intrusion Detection

Every network can be compromised. There are too many systems, offering too many services, running too many flawed applications. No amount of careful coding, patch management, or access control can keep out every attacker. If prevention eventually fails, how do you prepare for the intrusions that will eventually happen?

...
IP Routing Fundamentals
IP Routing Fundamentals

A comprehensive ntroduction to routing concepts and protocols in IP networks.

  • Comprehensive review of the operational mechanics of today's leading routing protocols, including IGRP, EIGRP, OSPF, RIP, and RIP-2
  • Detailed explanation of IP addressing, including classful and classless addresses, subnetting,...
Computational Intelligence in Time Series Forecasting: Theory and Engineering Applications
Computational Intelligence in Time Series Forecasting: Theory and Engineering Applications

Foresight can be crucial in process and production control, production-and-resources planning and in management decision making generally. Although forecasting the future from accumulated historical data has become a standard and reliable method in production and financial engineering, as well as in business and management, the use of time...

SQL All-in-One Desk Reference For Dummies (Computer/Tech)
SQL All-in-One Desk Reference For Dummies (Computer/Tech)

Master queries for any SQL database!

Your one-stop guide to building and maintaining relational databases with SQL

If you're looking for a good general reference on SQL, look no further. This all-in-one guide delivers the goods on all major SQL topics, from basic concepts to the...

unlimited object storage image
Result Page: 251 250 249 248 247 246 245 244 243 242 241 240 239 238 237 236 235 234 233 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy